Project Name: Packet Corruption and Decoding
Description: This project involves simulating packet corruption in IP headers, where various fields like TTL, protocol, source, and destination addresses are altered based on user input. The system reads and corrupts packets from a `.pcap` file and then saves the modified packets to a new `.pcap` file, allowing for analysis of how operating systems react to corrupted packets.
Programming Languages/Tools: C++, Wireshark, Netdump
Features:
- Captures packets using Wireshark and stores them as a `.pcap` file.
- Corrupts various IP packet fields based on user input:
- TTL set to 0
- Protocol set to unknown
- Source and destination address swapped
- Source address set to IP Multicast
- IP data length mismatch with UDP data length
- Corrupted packets are stored in a new file for comparison.
- Validation of source and destination addresses with Wireshark and Netdump.
View on GitHub
View Project Report